×

Exploit detection of malware and malware families

  • US 9,773,112 B1
  • Filed: 09/29/2014
  • Issued: 09/26/2017
  • Est. Priority Date: 09/29/2014
  • Status: Active Grant
First Claim
Patent Images

1. A computerized method for detecting malware comprising:

  • accessing information associated with one or more observed events, wherein the one or more observed events are associated via one or more observed relationships;

    accessing a reference model of a plurality of reference models, the reference model is based on a first plurality of events and comprises a first event, a second event and a first relationship that identifies that the second event is based on the first event, wherein a combination of at least the first plurality of events and the first relationship indicates a known cyber-attack;

    based on a correlation between the reference model and the accessed information, inferring that at least a third event of the first plurality of events has occurred or a second relationship between two events of the one or more observed events existed, wherein neither the third event nor the second relationship is indicated by the accessed information;

    analyzing (i) the information associated with the one or more observed events, and at least one of the third event or the second relationship that were inferred, and (ii) the reference model to determine whether a level of correlation between (a) the one or more observed events, and including at least one of the third event or the second relationship that were inferred, and (b) the reference model is at least a first threshold; and

    responsive to determining the level of correlation is at least the first threshold, determining that a combination of the one or more observed events, the one or more observed relationships, and at least one of the third event that was inferred or the second relationship that was inferred are associated with the known cyber-attack,wherein each of the first relationship and the second relationship comprises a connection that occurs during computer processing between at least two events, andwherein each of the one or more observed events, and the third event is an action or operation resulting from an execution of code.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×